13008 (v.3) Electronic Commerce (Internet Security) 304


 

Area:School of Information Systems
Credits:25.0
Contact Hours:3.0
Laboratory:1 x 1.5 Hours Weekly
Seminar:1 x 1.5 Hours Weekly
Prerequisite(s):12212 (v.4) Electronic Commerce (Electronic Commerce Technologies) 203 or any previous version
AND
13006 (v.4) Electronic Commerce (Web Site Management) 303 or any previous version
Syllabus:Computer and internet security principles, examination of risk identification, network firewalls, proxy applications, screened sub-nets, providing unsecured services, air gap networks, non-Internet protocol connection, external access, World Wide Web security issues, funds transfer issues, other application specific security issues, the role of audit and the internet crime investigation to prosecution process.
 
Unit Outcomes: On successful completion of this unit, students will have - Improved awareness of basic computer and internet security principles. Developed skills in using appropriate security software. Improved understanding of the impacts and implications to businessof applying basic computer and internet security principles. Developed understanding in the latest developments in this subject.
Text and references listed above are for your information only and current as of September 30, 2003. Please check with the unit coordinator for up-to-date information.
Unit References: Alexander, Michael (1997), Net Security: Your Digital Doberman, United States of America, Ventana Communications. Atkins. Derek, Buis. Paul, Hare. Chris, Kelley. Robert, Nachenberg. Carey, Nelson. Anthony. B, Phillips. Paul, Ritchey. Tim, Sheldon. Tom, and Snyder. Joel. (1997), Internet Security Professional Reference - Second Edition, United Stated of United States of America, New Riders Publishing. Pipkin. Donald. L (1997), Halting the Hacker: A Practical Guide to Computer Security, United States of America, Prentice Hall. Rubin. Aviel, D, Geer. Daniel, and Ranum, Marcus. J (1998), Web Security SourceBook: A Complete Guide to Web Security Threats and Solutions, United States of America, John Wiley and Sons. Stein. Lincoln. D. (1998), Web Security: A Step by Step Reference Guide, United States of America, Addison Wesley Longman Inc. Computer Security Journal (Available at Edith Cowan (Mt Lawley Campus) - S658.478 COM and at Curtin - P005 07893). Information Management and Computer Security (Available at Edith Cowan (Churchland's Campus)- S658.4038 INF).
Unit Texts: King. Christopher. M, Dalton. Curtis.E and Osmanoglu. Ertem. T (2001), Security Architecture - Design Deployment and Operations, California, McGraw Hill. Alternatives to the above textbook are - Bernstein. Terry, Bhimani. Anish, Schultz. Eugene and Siegel. Carol (1996), Internet Security for Business, United States of America, John Wiley and Sons. Ford. Warwick and Baum. S. Michael (2000), Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption, Upper Saddle River, Prentice Hall.
 
Unit Assessment Breakdown: Continuous Assessment 50%.Examination 50%. This is by grade/mark assessment.
YearLocationPeriodInternalArea ExternalCentral External
2004Bentley CampusSemester 2Y  
2004Miri Sarawak CampusSemester 1Y  
2004UHK SPACE Admiralty CtrTrimester 1AY  

 

Copyright and Disclaimer
Current as of: February 2, 2004
CRICOS provider code 00301J